The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
☆30Oct 24, 2019Updated 6 years ago
Alternatives and similar repositories for Attack_Face_Recognition
Users that are interested in Attack_Face_Recognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 3 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- ☆10May 14, 2023Updated 2 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- This repo is for ChaLearn Face Anti-spoofing Attack Detection Challenge@CVPR2019☆10Dec 3, 2019Updated 6 years ago
- Tools to make state of the art "face spoofing" attack detector☆16Feb 14, 2022Updated 4 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover☆34May 11, 2025Updated 11 months ago
- ☆22May 7, 2024Updated last year
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆65Apr 28, 2021Updated 4 years ago
- ☆12Jul 26, 2016Updated 9 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Apr 13, 2022Updated 4 years ago
- Image Manipulation Detection and Localization☆10Aug 10, 2023Updated 2 years ago
- tempeh is a framework to TEst Machine learning PErformance exHaustively which includes tracking memory usage and run time.☆18Jan 3, 2022Updated 4 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆137Feb 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- https://arxiv.org/abs/2102.12594☆14Oct 3, 2023Updated 2 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago
- Generative Regional Editing (GRE) Benchmark☆19Sep 10, 2024Updated last year
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago